[Bug tree-optimization/104964] Wrong *** buffer overflow detected ***: terminated - acl

siddhesh at gcc dot gnu.org gcc-bugzilla@gcc.gnu.org
Mon Mar 28 06:33:02 GMT 2022


https://gcc.gnu.org/bugzilla/show_bug.cgi?id=104964

Siddhesh Poyarekar <siddhesh at gcc dot gnu.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|ASSIGNED                    |RESOLVED
         Resolution|---                         |WONTFIX

--- Comment #15 from Siddhesh Poyarekar <siddhesh at gcc dot gnu.org> ---
(In reply to Jakub Jelinek from comment #14)
> Thus I'd say fix up acl instead.

OK, closing this as WONTFIX then.  __bos/__bdos has limited support for zero
sized arrays; they are not recognized as flex arrays when in nested structs. 
Fixing up the struct to one with a proper flex array (i.e. without a dimension
size, which also will need another member preceding it) should make this work
correctly.  Something like:

struct __string_ext
{
  char pad;
  char s_str[];
};


More information about the Gcc-bugs mailing list